OK, I ran the RKR and HJT, they both appear clean to me:
rootkit log:
HKLM\SECURITY\Policy\Secrets\SAC*:
Description: Key name contains embedded nulls (*)
Date: 10/26/2005 10:40 AM
Size: 0 bytes
HKLM\SECURITY\Policy\Secrets\SAI*:
Description: Key name contains embedded...
thats my next step.
already ran ewido, did not detect watchdll.dll(as a slave), but it was in a temp folder so I will manually clean those, then boot the system and run the revealer.
Thanks.
Thanks! Will report back soon...have a conference call now :-(
Also note, I currently have the infected drive as a slave on a clean system. will the rootkit detector still work (i should think so)?
Hello-
I have encountered a computer with various trojans and a keylogger component (watchdll.dll, reportedly part of cybervizion) -- and no scanners I have yet found have detected it or its other components.
Whats do you recommend as a:
1)good keylogger detection utility (when scanning drive...
is there a default email program listed in internet options? (under programs tab)
maybe try running the fixmapi utility.
http://support.microsoft.com/kb/228457
i have the same setup at hom, will check my config and report back tomorrow if i find anything of relevance, otherwise - you should try to force vista to do an upgrade install, which would(should) retain most settings
you can also change the LPT port settings on the PC, in the BIOS (setup screen - usually F2, DEL, etc before booting), from ECP to standard or bi-directional.
consider installing a keystroke logger. at least you would know what any intruders had typed. might provide a clue.
might also be worth setting up a hidden videocam/webcam if you are still concerned about another intrusion.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.